In the last six months, hackers have targeted US companies running operational networks like the Colonial Pipeline fuel system. Getty
In the last six months, hackers have targeted US companies running operational networks like the Colonial Pipeline fuel system. Getty
In the last six months, hackers have targeted US companies running operational networks like the Colonial Pipeline fuel system. Getty
In the last six months, hackers have targeted US companies running operational networks like the Colonial Pipeline fuel system. Getty

Why US power and water companies are vulnerable to cyber attacks


  • English
  • Arabic

When the Los Angeles Department of Water and Power was hacked in 2018, it took a mere six hours. Early this year, an intruder lurked in hundreds of computers related to water systems across the US. In Portland, Oregon, burglars installed malicious computers onto a grid providing power to a chunk of the Northwest.

Two of those cases –  L.A. and Portland –  were tests. The water threat was real, discovered by cyber security firm Dragos.

All three drive home a point long known but, until recently, little appreciated: the digital security of US computer networks controlling the machines that produce and distribute water and power is woefully inadequate, a low priority for operators and regulators, posing a terrifying national threat.

“If we have a new world war tomorrow and have to worry about protecting infrastructure against a cyberattack from Russia or China, then no, I don’t think we’re where we’d like to be,” said Andrea Carcano, co-founder of Nozomi Networks, a control system security company.

Hackers working for profit and espionage have long threatened American information systems. But in the last six months, they’ve targeted companies running operational networks like the Colonial Pipeline fuel system, with greater persistence. These are the systems where water can be contaminated, a gas line can spring a leak or a substation can explode.

The threat has been around for at least a decade –  and fears about it for a generation –  but cost and indifference posed obstacles to action.

It isn’t entirely clear why ransomware hackers –  those who use malicious software to block access to a computer system until a sum of money has been paid –  have recently moved from small-scale universities, banks and local governments to energy companies, meatpacking plants and utilities. Experts suspect increased competition and bigger payouts as well as foreign government involvement. The shift is finally drawing serious attention to the problem.

The US government began taking small steps to defend cyber security in 1998 when the Clinton administration identified 14 private sectors as critical infrastructure, including chemicals, defense, energy and financial services. This triggered regulation in finance and power. Other industries were slower to protect their computers, including the oil and gas sector, said Rob Lee, the founder of Dragos.

One of the reasons is the operational and financial burden of pausing production and installing new tools.

Much of the infrastructure running technology systems is too old for sophisticated cybersecurity tools. Ripping and replacing hardware is costly as are service outages. Network administrators fear doing the job piecemeal may be worse because it can increase a network’s exposure to hackers, said Nozomi’s Ms Carcano.

Although the Biden administration’s budget includes $20 billion to upgrade the country’s grid, this comes after a history of shoulder shrugging from federal and local authorities. Even where companies in under-regulated sectors like oil and gas have prioritised cybersecurity, they’ve been met with little support.

Take the case of ONE Gas in Tulsa, Oklahoma.

Niyo Little Thunder Pearson was overseeing cybersecurity there in January 2020 when his team was alerted to malware trying to enter its operational system -– the side that controls natural gas traffic across Oklahoma, Kansas and Texas.

For two days, his team was in a dogfight with the hackers who moved laterally across the network. Ultimately, Mr Pearson’s team managed to expel the intruders. When Richard Robinson at Cynalytica fed the corrupted files into his own identification program, ONE Gas learned it was dealing with malware capable of executing ransomware, exploiting industrial control systems and harvesting user credentials. At its core were digital footprints found in some of the most malicious code of the last decade.

Mr Pearson tried to bring the data to the Federal Bureau of Investigation but it would only accept it on a compact disc, he said. His system couldn’t burn the data onto a CD. When he alerted the Department of Homeland Security and sent it through a secure portal, he never heard back.

Mr Robinson of Cynalytica was convinced a nation-state operator had just attacked a regional natural gas provider. So he gave a presentation to DHS, the Departments of Energy and Defense and the intelligence community on a conference call. He never heard back either.

“We got zero, and that was what was really surprising,” he said. “Not a single individual reached back out to find out more about what happened to ONE Gas.”

The agencies didn’t respond to requests for comment.

Such official indifference –  even hostility –  hasn’t been uncommon.

The 2018 break-in to the LA water and power system is another example.

These weren’t criminals but hackers-for-hire paid to break into the system to help it improve security.

Fuel tanks at a Colonial Pipeline station in Maryland. The pipeline delivers about half of the fuel consumed along the US Gulf Coast. Reuters
Fuel tanks at a Colonial Pipeline station in Maryland. The pipeline delivers about half of the fuel consumed along the US Gulf Coast. Reuters

After the initial intrusion, the city’s security team asked the hackers to assume the original source of compromise had been fixed (it hadn’t) while hunting for a new one. They found many.

Between the end of 2018 and most of 2019, the hired hackers discovered 33 compromised paths, according to a person familiar with the test who wasn’t authorised to speak publicly.

Bloomberg News reviewed a report produced by the hackers for Mayor Eric Garcetti’s office. It described 10 vulnerabilities found during their own test, along with 23 problems researchers had discovered as early as 2008. (Bloomberg News won’t publish information that hackers could use to attack the utility.) The person familiar with the operation discovered that few, if any, of the 33 security gaps have been fixed since the report’s submission in September 2019.

It gets worse.

Soon after the hackers produced the report, Mayor Garcetti terminated their contract, according to a preliminary legal claim filed by the hackers hired from Ardent Technology Solutions in March 2020. The company alleges the mayor fired the hackers as a “retaliatory measure” for the scathing report.

Ellen Cheng, a utility spokeswoman, acknowledged that Ardent’s contract was terminated but said it had nothing to do with the report’s substance. She said the utility frequently partners with public agencies to improve security, including scanning for potential cyber threats.

“We want to assure our customers and stakeholders that cybersecurity is of the utmost importance to LADWP and that appropriate steps have been taken to ensure that our cybersecurity is compliant with all applicable laws and security standards,” Ms Cheng said in a statement.

Mr Garcetti’s office didn’t respond to a request for comment.

The case of the Oregon network –  the Bonneville Power Administration – is no more encouraging.

The testing went on for years beginning in 2014 and involved an almost shocking level of intrusion followed by a pair of public reports. One published in 2017 admonished the agency for repeatedly failing to take action.

By 2020, two-thirds of the more than 100 flaws identified by the Department of Energy and the utility’s own security team hadn’t been resolved, according to interviews with more than a dozen former and current Bonneville security personnel and contractors and former members of the Department of Energy cyber team, in addition to documents, some accessed via Freedom of Information Act request.

Doug Johnson, a spokesperson for Bonneville, said a team reviewed the security reports in mid-2019 and that efforts to remediate those are ongoing. The utility acknowledged that hackers were able to breach certain BPA systems in those test hacks, but Mr Johnson said “at no time were they able to gain access to any of the BPA systems that monitor or control the power grid”.

Dragos estimated in its 2020 cybersecurity report that 90 per cent of its new customers had “extremely limited to no visibility” inside their industrial control systems. That means that once inside, hackers have free rein to collect sensitive data, investigate system configurations and choose the right time to wage an attack.

The industry is finally focused on fighting back.

“If the bad guys come after us, there has to be an eye-for-an-eye, or better,” observed Tom Fanning, chief executive of Southern, at a conference this week. “We’ve got to make sure the bad guys understand there will be consequences.”

Company Profile:

Name: The Protein Bakeshop

Date of start: 2013

Founders: Rashi Chowdhary and Saad Umerani

Based: Dubai

Size, number of employees: 12

Funding/investors:  $400,000 (2018) 

ENGLAND SQUAD

Joe Root (captain), Dom Sibley, Rory Burns, Dan Lawrence, Ben Stokes, Ollie Pope, Ben Foakes (wicketkeeper), Moeen Ali, Olly Stone, Chris Woakes, Jack Leach, Stuart Broad

Fixtures and results:

Wed, Aug 29:

  • Malaysia bt Hong Kong by 3 wickets
  • Oman bt Nepal by 7 wickets
  • UAE bt Singapore by 215 runs

Thu, Aug 30: UAE v Nepal; Hong Kong v Singapore; Malaysia v Oman

Sat, Sep 1: UAE v Hong Kong; Oman v Singapore; Malaysia v Nepal

Sun, Sep 2: Hong Kong v Oman; Malaysia v UAE; Nepal v Singapore

Tue, Sep 4: Malaysia v Singapore; UAE v Oman; Nepal v Hong Kong

Thu, Sep 6: Final

NATIONAL%20SELECTIONS
%3Cp%3E6.00pm%3A%20Heros%20de%20Lagarde%3Cbr%3E6.35pm%3A%20City%20Walk%3Cbr%3E7.10pm%3A%20Mimi%20Kakushi%3Cbr%3E7.45pm%3A%20New%20Kingdom%3Cbr%3E8.20pm%3A%20Siskany%3Cbr%3E8.55pm%3A%20Nations%20Pride%3Cbr%3E9.30pm%3A%20Ever%20Given%3C%2Fp%3E%0A
Ten tax points to be aware of in 2026

1. Domestic VAT refund amendments: request your refund within five years

If a business does not apply for the refund on time, they lose their credit.

2. E-invoicing in the UAE

Businesses should continue preparing for the implementation of e-invoicing in the UAE, with 2026 a preparation and transition period ahead of phased mandatory adoption. 

3. More tax audits

Tax authorities are increasingly using data already available across multiple filings to identify audit risks. 

4. More beneficial VAT and excise tax penalty regime

Tax disputes are expected to become more frequent and more structured, with clearer administrative objection and appeal processes. The UAE has adopted a new penalty regime for VAT and excise disputes, which now mirrors the penalty regime for corporate tax.

5. Greater emphasis on statutory audit

There is a greater need for the accuracy of financial statements. The International Financial Reporting Standards standards need to be strictly adhered to and, as a result, the quality of the audits will need to increase.

6. Further transfer pricing enforcement

Transfer pricing enforcement, which refers to the practice of establishing prices for internal transactions between related entities, is expected to broaden in scope. The UAE will shortly open the possibility to negotiate advance pricing agreements, or essentially rulings for transfer pricing purposes. 

7. Limited time periods for audits

Recent amendments also introduce a default five-year limitation period for tax audits and assessments, subject to specific statutory exceptions. While the standard audit and assessment period is five years, this may be extended to up to 15 years in cases involving fraud or tax evasion. 

8. Pillar 2 implementation 

Many multinational groups will begin to feel the practical effect of the Domestic Minimum Top-Up Tax (DMTT), the UAE's implementation of the OECD’s global minimum tax under Pillar 2. While the rules apply for financial years starting on or after January 1, 2025, it is 2026 that marks the transition to an operational phase.

9. Reduced compliance obligations for imported goods and services

Businesses that apply the reverse-charge mechanism for VAT purposes in the UAE may benefit from reduced compliance obligations. 

10. Substance and CbC reporting focus

Tax authorities are expected to continue strengthening the enforcement of economic substance and Country-by-Country (CbC) reporting frameworks. In the UAE, these regimes are increasingly being used as risk-assessment tools, providing tax authorities with a comprehensive view of multinational groups’ global footprints and enabling them to assess whether profits are aligned with real economic activity. 

Contributed by Thomas Vanhee and Hend Rashwan, Aurifer

Our legal columnist

Name: Yousef Al Bahar

Advocate at Al Bahar & Associate Advocates and Legal Consultants, established in 1994

Education: Mr Al Bahar was born in 1979 and graduated in 2008 from the Judicial Institute. He took after his father, who was one of the first Emirati lawyers

Living in...

This article is part of a guide on where to live in the UAE. Our reporters will profile some of the country’s most desirable districts, provide an estimate of rental prices and introduce you to some of the residents who call each area home.